> "Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety."
Learning Objectives
- Describe the major legal authorities and programs governing mass surveillance in the US and allied nations
- Evaluate the effectiveness and limitations of democratic oversight mechanisms for intelligence activities
- Analyze the encryption debate, including the arguments for and against lawful access to encrypted communications
- Apply proportionality analysis to national security surveillance programs
- Assess the disproportionate impact of national security surveillance on communities of color and other marginalized groups
- Connect national security surveillance to the recurring themes of Power Asymmetry, Consent Fiction, and Accountability Gap
In This Chapter
- Chapter Overview
- 36.1 Mass Surveillance Programs: Architecture and Authority
- 36.2 The Encryption Debate: Security, Privacy, and "Going Dark"
- 36.3 Democratic Oversight: Mechanisms and Their Limits
- 36.4 Proportionality: Balancing Security and Liberty
- 36.5 Surveillance and Communities of Color
- 36.6 Reform Proposals and Future Directions
- 36.7 Chapter Summary
- What's Next
- Chapter 36 Exercises → exercises.md
- Chapter 36 Quiz → quiz.md
- Case Study: The FISA Court — Secret Justice and Democratic Accountability → case-study-01.md
- Case Study: The Encryption Wars — Apple vs. FBI → case-study-02.md
Chapter 36: National Security, Intelligence, and Democratic Oversight
"Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety." — Benjamin Franklin, Reply to the Governor (1755)
Chapter Overview
On June 5, 2013, journalist Glenn Greenwald published a classified court order in The Guardian. The order, from the Foreign Intelligence Surveillance Court (FISC), directed Verizon to turn over to the National Security Agency (NSA) the telephone records — the metadata — of millions of Americans on an "ongoing, daily basis." The order covered all calls "wholly within the United States, including local telephone calls" and all calls between the United States and abroad.
The following day, The Guardian and The Washington Post revealed PRISM — an NSA program that collected communications data directly from the servers of major technology companies including Microsoft, Google, Yahoo, Facebook, Apple, and others. The source of the leaks was Edward Snowden, a 29-year-old NSA contractor who had copied approximately 1.5 million classified documents before fleeing to Hong Kong and then Russia.
The Snowden revelations were a watershed moment for the relationship between data governance and national security. They revealed that the surveillance infrastructure of the world's most powerful intelligence agencies had been quietly repurposed from targeted foreign intelligence collection to mass domestic data collection — with legal authorization from a secret court, minimal congressional oversight, and no public knowledge.
This chapter examines the tension between national security surveillance and democratic governance. It covers the legal authorities that enable mass surveillance, the oversight mechanisms that are supposed to constrain it, the ongoing encryption debate, and the disproportionate impact of national security surveillance on marginalized communities. The Power Asymmetry here is at its most extreme: the full weight of state intelligence capability deployed against individuals who cannot know they are being watched, cannot challenge the surveillance, and in many cases cannot even discuss it.
In this chapter, you will learn to: - Navigate the legal framework governing intelligence surveillance in the United States and allied nations - Evaluate whether democratic oversight mechanisms provide meaningful accountability - Analyze the encryption debate with attention to the tradeoffs between security and privacy - Apply proportionality analysis to national security surveillance programs - Assess how surveillance power intersects with racial and social inequality
36.1 Mass Surveillance Programs: Architecture and Authority
36.1.1 The Legal Framework: FISA and Its Amendments
The Foreign Intelligence Surveillance Act (FISA), enacted in 1978, was originally designed to regulate electronic surveillance conducted for foreign intelligence purposes. It was a response to revelations by the Church Committee (1975-1976) that US intelligence agencies had conducted warrantless surveillance of American citizens, including civil rights leaders, anti-war activists, and political opponents.
FISA established:
- The Foreign Intelligence Surveillance Court (FISC) — a secret court composed of 11 federal judges, appointed by the Chief Justice of the Supreme Court, authorized to approve surveillance orders for foreign intelligence purposes.
- Procedural requirements — applications for surveillance orders must demonstrate probable cause that the target is a "foreign power" or "agent of a foreign power."
- Minimization procedures — rules requiring the government to minimize the retention and dissemination of information about US persons collected incidentally.
FISA was designed for a world of targeted surveillance — monitoring specific individuals suspected of espionage or terrorism. The framework assumed that surveillance would be individually targeted and judicially authorized.
The September 11, 2001 attacks transformed this framework. The USA PATRIOT Act (2001) expanded FISA in several ways:
- Section 215 (the "business records" provision) expanded the government's authority to obtain "any tangible things" (including telephone records, financial records, and internet metadata) relevant to an authorized investigation. This provision was later interpreted by the FISC to authorize the bulk collection of domestic telephone metadata revealed by Snowden.
- Roving wiretaps allowed surveillance orders that followed a target across multiple communication devices and service providers.
- The "lone wolf" provision allowed surveillance of non-US persons engaged in international terrorism even without a connection to a foreign power or terrorist organization.
36.1.2 Section 702: Upstream and Downstream Collection
Section 702 of the FISA Amendments Act (2008) is the legal authority for the most expansive US surveillance programs. It authorizes the NSA to collect communications of non-US persons located outside the United States — without individual court orders — when the collection targets specific "selectors" (email addresses, phone numbers) associated with foreign intelligence targets.
Two key programs operate under Section 702:
PRISM (downstream collection). The NSA sends selectors (email addresses, phone numbers) to US technology companies (Google, Microsoft, Meta, Apple, etc.), which are legally compelled to provide communications associated with those selectors. The companies act as intermediaries, searching their systems and providing responsive communications.
Upstream collection. The NSA collects communications directly from the telecommunications infrastructure — the fiber optic cables and internet exchange points through which internet traffic flows. This allows collection of communications that mention or contain selectors, not just communications to or from targeted accounts. The "about" collection aspect of upstream surveillance was particularly controversial because it swept up communications that merely referenced a target, rather than communications sent or received by the target.
36.1.3 Incidental Collection and the Backdoor Search Loophole
A critical issue with Section 702 is incidental collection — the acquisition of US persons' communications that happen to involve foreign intelligence targets. When an American emails or calls someone who is a Section 702 target, both sides of the communication are collected. The American's communication is now in the NSA's database — not because the American was targeted, but because they communicated with someone who was.
The scale of incidental collection is significant. The NSA collects over 250 million internet communications per year under Section 702 (PCLOB, 2014). An unknown but substantial proportion of these involve US persons.
The backdoor search loophole compounds this concern. Once communications are in the Section 702 database, FBI agents can search the database using US person identifiers (names, email addresses, phone numbers) — without a warrant. This allows the FBI to effectively conduct warrantless surveillance of Americans by searching a database that was legally constructed for foreign intelligence purposes.
"Think about what this means," Eli said during a seminar discussion. "The government collects massive quantities of communications under the authority to target foreigners. Then it searches that database for Americans — without a warrant, without probable cause, without any of the protections the Fourth Amendment is supposed to provide. The legal framework says they can't target Americans. But they can search for Americans in a database they created by targeting foreigners. The result is the same."
36.1.4 The Five Eyes Alliance
The Five Eyes alliance — comprising the intelligence agencies of the United States (NSA), United Kingdom (GCHQ), Canada (CSE), Australia (ASD), and New Zealand (GCSB) — is the world's most extensive intelligence-sharing arrangement.
Five Eyes cooperation enables intelligence agencies to share information collected under their respective legal authorities. This creates a potential circumvention mechanism: an agency prohibited from surveilling its own citizens may receive surveillance of those citizens from a partner agency operating under different legal constraints.
The extent to which Five Eyes sharing is used to circumvent domestic legal protections is debated. Intelligence agencies deny systematic circumvention. Civil liberties organizations argue that the architecture of the alliance creates the structural capacity for circumvention, regardless of whether that capacity is routinely exercised.
Callout Box: The Intelligence Surveillance Architecture
Program/Authority Legal Basis Target Type of Collection Oversight Traditional FISA FISA (1978) Individual foreign agents Targeted surveillance FISC individual orders Section 215 (expired/reformed) PATRIOT Act §215 Business records Bulk metadata collection FISC orders (periodic review) Section 702 PRISM FISA Amendments Act §702 Foreign persons abroad Communications via tech companies FISC annual certification Section 702 Upstream FISA Amendments Act §702 Foreign persons abroad Communications from telecom infrastructure FISC annual certification Executive Order 12333 Presidential authority Foreign intelligence abroad Signals intelligence Executive branch only National Security Letters Various statutes US persons Subscriber records, financial records Minimal judicial review
36.2 The Encryption Debate: Security, Privacy, and "Going Dark"
36.2.1 The "Going Dark" Problem
Law enforcement and intelligence agencies have argued that the widespread adoption of strong encryption is creating a "going dark" problem — a situation in which lawfully authorized surveillance is rendered technically impossible because communications are encrypted in ways that the platform operator itself cannot decrypt.
End-to-end encryption (E2EE) — as implemented in Signal, WhatsApp, iMessage, and other platforms — ensures that only the sender and recipient can read a communication. The platform operator, the internet service provider, and any government agency intercepting the communication in transit see only encrypted data that they cannot decrypt.
FBI Director James Comey articulated the going dark argument in 2014: "Those charged with protecting our people aren't always able to access the evidence we need to prosecute crime and prevent terrorism even with lawful authority. We have the legal authority to intercept and access communications and information pursuant to court order, but we often lack the technical ability to do so."
36.2.2 The Backdoor Debate
The proposed solution — from the perspective of law enforcement and some policymakers — is to require technology companies to build lawful access mechanisms (critics call them "backdoors") into encrypted systems, enabling access to encrypted communications when presented with a valid court order.
Arguments for lawful access:
- Democratic accountability. Courts issue warrants based on probable cause. Encryption that prevents the execution of lawful warrants undermines democratic governance and the rule of law.
- Public safety. Encrypted communications are used by terrorists, child predators, and other criminals. The inability to access these communications hinders investigations and costs lives.
- Historical precedent. The telephone system was designed with lawful intercept capability (CALEA, 1994). Encryption that eliminates intercept capability represents a regression from the status quo, not the maintenance of it.
Arguments against backdoors:
-
Technical impossibility of "good-only" backdoors. Cryptographers have consistently argued that it is technically impossible to build a backdoor that is accessible only to authorized parties. Any mechanism that allows government access also creates a vulnerability that can be exploited by hackers, foreign intelligence agencies, and criminal organizations. A backdoor is a backdoor, regardless of who holds the key.
-
Global implications. If the United States requires backdoors, authoritarian governments will demand the same access. A legal framework that enables US law enforcement access to encrypted communications will be replicated by China, Russia, Saudi Arabia, and other governments — to surveil dissidents, journalists, and opposition activists.
-
Security vs. security. Strong encryption protects not just criminals but also journalists, activists, domestic violence survivors, whistleblowers, corporate trade secrets, military communications, and critical infrastructure. Weakening encryption to enable surveillance weakens the security of everyone who depends on encrypted communications — which is everyone.
-
The "abundance" argument. Even without access to encrypted content, law enforcement has access to more data than at any previous point in history — location data, metadata, transaction records, social media posts, surveillance camera footage. The "going dark" narrative overstates the loss of investigative capability.
36.2.3 The Apple vs. FBI Case
The tension crystallized in the 2016 dispute between Apple and the FBI over access to an iPhone belonging to one of the San Bernardino attackers.
The FBI obtained a court order under the All Writs Act (1789) requiring Apple to develop custom software — a modified iOS that would disable the security features preventing brute-force password guessing — to enable the FBI to access the phone's encrypted contents.
Apple refused, arguing that creating such software would establish a dangerous precedent:
"The government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers... If the government can use the All Writs Act to make it easier to unlock your iPhone, it would have the power to reach into anyone's device to capture their data."
The case was resolved when the FBI obtained access through a third-party security firm, mooting the legal dispute. But the underlying tension remains unresolved. Congress has not legislated on the question, the courts have not provided definitive guidance, and the technical arguments against backdoors remain as strong as ever.
Key Insight: The encryption debate is fundamentally a debate about who should bear the risk. Backdoors impose security risks on all users to enable law enforcement access to a small number of criminal communications. Strong encryption imposes investigative costs on law enforcement to protect the security of all communications. The question is not whether risk exists but how it should be distributed — a question that connects directly to the justice theory framework examined in Chapter 6.
36.2.4 Client-Side Scanning: A Proposed Compromise?
A more recent proposal attempts to thread the needle: client-side scanning (CSS) would scan communications on the user's device before they are encrypted, flagging content that matches a database of known harmful material (typically child sexual abuse material).
Proponents argue that CSS preserves encryption in transit while enabling detection of specific categories of harmful content. Critics — including a group of 14 leading cryptographers and computer scientists (Abelson et al., 2021) — argue that:
- CSS creates a surveillance infrastructure that can be repurposed. A system designed to scan for child abuse material can be modified to scan for political dissent, protest coordination, or journalistic sources.
- The matching databases are controlled by governments, creating the potential for mission creep.
- False positives in CSS systems could expose innocent users to investigation based on automated misclassification.
- CSS fundamentally undermines the promise of end-to-end encryption by performing surveillance at the endpoint.
Apple announced and then abandoned a CSS system in 2021-2022, citing privacy concerns and the risk of government abuse.
36.3 Democratic Oversight: Mechanisms and Their Limits
36.3.1 The FISA Court: Secret Justice
The Foreign Intelligence Surveillance Court (FISC) is the primary judicial oversight mechanism for intelligence surveillance. Its design reflects the unique requirements of foreign intelligence: proceedings are classified, applications are heard ex parte (only the government's side is presented), and orders are secret.
Structural concerns:
- One-sided proceedings. In a traditional court, both sides present arguments. In the FISC, only the government appears. There is no adversary to challenge the government's claims, question its evidence, or present alternative interpretations of the law.
- Approval rate. Between 1979 and 2023, the FISC approved approximately 99.9% of government applications. While the government argues this reflects the high quality of applications (which are vetted internally before submission), critics argue it reflects a culture of deference rather than meaningful review.
- Secret law. The FISC's opinions interpreting FISA and the Constitution are themselves classified. Until the Snowden revelations forced partial declassification, the public had no access to the FISC's interpretation of the legal authorities governing mass surveillance. This meant that US law was being interpreted — and constitutional rights were being defined — in secret.
- Post-2015 reforms. The USA FREEDOM Act (2015), passed in response to the Snowden revelations, made several reforms: it ended the bulk collection of telephone metadata under Section 215, created a panel of amici curiae (friends of the court) who could be appointed to present arguments opposing the government in significant cases, and required the declassification of significant FISC opinions. These reforms were meaningful but limited — the amici are appointed at the court's discretion and have participated in only a small number of cases.
"The FISC is a court in name," Dr. Adeyemi said. "But it lacks the features we normally associate with judicial oversight — adversarial proceedings, public accountability, and meaningful independence. It's a secret court, hearing one-sided arguments, producing secret law. Whether that constitutes democratic oversight depends on what you mean by 'democratic.'"
36.3.2 Congressional Oversight
Congressional oversight of intelligence activities operates primarily through the Senate Select Committee on Intelligence (SSCI) and the House Permanent Select Committee on Intelligence (HPSCI). These committees:
- Receive briefings on intelligence programs and activities
- Conduct hearings (often classified)
- Review and authorize intelligence budgets
- Investigate alleged abuses
Limitations of congressional oversight:
-
Classification constraints. Committee members receive classified briefings but often cannot discuss what they learn with the full Congress, the public, or even their own staff. Senator Ron Wyden spent years warning about mass surveillance in cryptic public statements ("I want to deliver a warning this afternoon: when the American people find out how their government has secretly interpreted the Patriot Act, they will be stunned and they will be angry") without being able to reveal the specific programs he was warning about.
-
Capture and deference. Intelligence committees have historically exhibited a tendency toward deference to the intelligence community — a dynamic critics describe as "oversight" that functions more as "overlook." The committees' access to classified information creates a sense of shared membership in the intelligence enterprise that can compromise critical distance.
-
Partisan dynamics. Intelligence oversight has become increasingly partisan, with committee members often prioritizing party loyalty over institutional oversight responsibility.
-
Technical complexity. The technical sophistication of modern surveillance programs exceeds the expertise of most committee members and staff. Oversight of complex data collection programs requires technical literacy that the committee structure does not consistently provide.
36.3.3 Inspectors General
Inspectors General (IGs) within intelligence agencies provide an internal oversight mechanism. The Inspector General of the Intelligence Community (ICIG), the NSA IG, the CIA IG, and the FBI IG conduct audits, investigate complaints, and report findings to agency heads and Congress.
IGs have produced significant findings — the DOJ IG's 2019 report on FBI FISA applications, which documented 17 significant inaccuracies and omissions in the Carter Page surveillance application, was a landmark in oversight accountability. But IGs face structural limitations:
- They are appointed by (and can be removed by) the agency heads they oversee
- Their investigations can be obstructed by classification claims
- Their recommendations are advisory, not binding
- Their effectiveness depends on the willingness of agency leadership and Congress to act on their findings
Callout Box: Democratic Oversight Mechanisms — Summary
Mechanism Strengths Limitations FISA Court Judicial review; legal interpretation Secret proceedings; one-sided; 99.9% approval rate Congressional committees Democratic accountability; budget authority Classification constraints; partisan dynamics; technical gaps Inspectors General Internal expertise; investigative authority Agency appointment; advisory recommendations; obstruction risk Privacy and Civil Liberties Oversight Board (PCLOB) Independent analysis; public reporting Limited authority; political appointment; vacancy problems Whistleblowers Direct public accountability Criminal prosecution risk; career destruction; political polarization
36.4 Proportionality: Balancing Security and Liberty
36.4.1 The Proportionality Framework
International human rights law, the European Convention on Human Rights, and many national legal systems employ a proportionality framework for evaluating surveillance. The framework asks whether a surveillance measure:
-
Pursues a legitimate aim. National security, prevention of terrorism, and protection of public safety are generally accepted as legitimate aims.
-
Is necessary. Could the legitimate aim be achieved through less intrusive means? If targeted surveillance could achieve the same security benefit as mass surveillance, the mass surveillance is not necessary.
-
Is proportionate. Even if necessary, does the surveillance impose burdens on rights (privacy, freedom of expression, freedom of association) that are disproportionate to the security benefit achieved?
-
Has adequate safeguards. Are there oversight mechanisms, time limits, review procedures, and remedies for abuse that constrain the surveillance and provide accountability?
36.4.2 Applying Proportionality to Mass Surveillance
Applying proportionality analysis to mass surveillance programs like those revealed by Snowden produces challenging results:
Legitimate aim: Counterterrorism is a legitimate aim. This element is generally satisfied.
Necessity: The necessity of mass surveillance is contested. Intelligence agencies argue that bulk collection is necessary because you cannot know which communications are relevant to a threat until you have collected and analyzed them — the "needle in a haystack" argument requires first collecting the haystack. Critics argue that targeted surveillance based on specific suspicion has proven effective against terrorist plots and that the marginal security benefit of mass collection is minimal relative to its costs.
The empirical evidence is inconclusive. The President's Review Group on Intelligence and Communications Technologies (2013) found that "the information contributed to terrorist investigations by the use of section 215 telephony meta-data was not essential to preventing attacks." But intelligence agencies argue that the program's value lies in providing leads that are then developed through other methods — a claim that is difficult to evaluate because the relevant evidence is classified.
Proportionality: Mass surveillance imposes costs on the privacy, free expression, and association rights of entire populations — not just suspected terrorists. The chilling effect of mass surveillance on journalism, activism, legal consultation, and political dissent is well-documented (PEN America, 2013; Human Rights Watch, 2014). Whether these costs are proportionate to the security benefits depends on the magnitude of the security benefits — which, as noted, is contested.
Safeguards: The adequacy of safeguards is the most debated element. The FISC, congressional oversight, and IG mechanisms described above provide some safeguards — but their structural limitations (secrecy, deference, classification constraints) raise questions about whether they provide adequate safeguards.
36.4.3 The European Perspective
European courts have generally been more skeptical of mass surveillance than their American counterparts:
-
The Court of Justice of the European Union (CJEU) invalidated the EU-US Safe Harbor data transfer framework (Schrems I, 2015) and its successor Privacy Shield (Schrems II, 2020) in part because US surveillance programs did not provide EU citizens with adequate protection or effective judicial remedies.
-
The European Court of Human Rights (ECtHR) ruled in Big Brother Watch v. UK (2021) that GCHQ's bulk interception program violated Article 8 (right to private life) of the European Convention on Human Rights because it lacked sufficient safeguards, particularly regarding the selection of search terms and the oversight of the process.
These rulings have had practical consequences — they disrupted transatlantic data flows, required new legal frameworks (the EU-US Data Privacy Framework, 2023), and placed ongoing pressure on US surveillance reform.
36.5 Surveillance and Communities of Color
36.5.1 Historical Context
Eli's research for his senior thesis had led him deep into the history of government surveillance of communities of color in the United States. The patterns were consistent across eras:
COINTELPRO (1956-1971). The FBI's Counter Intelligence Program targeted civil rights organizations, Black nationalist groups, the American Indian Movement, and anti-war organizations. Activities included illegal wiretapping, infiltration, blackmail, and campaigns of character assassination. Martin Luther King Jr. was surveilled extensively — the FBI sent him an anonymous letter suggesting he commit suicide.
Japanese American internment (1942-1945). Census data was used to identify and locate Japanese Americans for forced internment — a case study in how data collected for one purpose can be weaponized for another (Chapter 2).
Post-9/11 surveillance of Muslim communities. The NYPD's Demographics Unit (later renamed the Zone Assessment Unit) conducted mass surveillance of Muslim communities in New York, New Jersey, and beyond — mapping mosques, monitoring student groups, and infiltrating community organizations. The Associated Press's 2011-2012 investigation revealed that the program had not generated a single terrorism lead.
Aerial surveillance of Black Lives Matter protests. During the 2020 protests following the murder of George Floyd, the FBI, DEA, CBP, and National Guard deployed surveillance aircraft over protest cities, collecting imagery and communications data on protesters exercising their First Amendment rights.
36.5.2 Structural Patterns
Eli identified three structural patterns in the history of surveillance targeting communities of color:
Pattern 1: Threat inflation. Communities of color — particularly those engaged in political organizing — are consistently characterized as security threats. This characterization justifies surveillance that is then used to disrupt, discredit, and disable the organizations that threaten established power structures. The characterization is not neutral intelligence analysis; it is a political act that reflects who has the power to define "threat."
Pattern 2: Classification as cover. The classification of surveillance activities makes it impossible for affected communities to know they are being surveilled, to challenge the surveillance, or to hold the surveillance agencies accountable. Classification serves a legitimate purpose (protecting intelligence sources and methods) but also serves as a shield against democratic accountability.
Pattern 3: Normalization through technology. Each new surveillance technology — from wiretaps to CCTV to social media monitoring to facial recognition — is initially deployed against marginalized communities, where resistance is weakest and political consequences are lowest. Once normalized, the technology expands to broader populations. "My neighborhood is always the pilot program," Eli told the class. "The cameras come to our streets first. The facial recognition gets tested on our faces first. By the time the rest of the city objects, it's already been normalized."
36.5.3 Data-Driven Discrimination in National Security
Contemporary surveillance programs inherit and amplify these historical patterns through data-driven mechanisms:
Suspicious Activity Reporting (SAR). The "Nationwide Suspicious Activity Reporting Initiative" encourages law enforcement and the public to report "suspicious" behavior. Research has documented that SAR reports disproportionately target people of color, Muslims, and immigrants — reflecting the same racial profiling biases that affect policing more broadly (Brennan Center for Justice, 2017).
Social media monitoring. Federal agencies use social media monitoring tools to track individuals and communities. Immigration and Customs Enforcement (ICE) has monitored the social media accounts of immigration activists. The FBI has monitored "Black Identity Extremists" — a category it created in 2017 that civil rights organizations condemned as a mechanism for surveilling Black activists.
Algorithmic targeting. The machine learning systems used to identify potential security threats are trained on historical data that reflects decades of discriminatory targeting. If the training data disproportionately associates Black and Muslim communities with security threats, the algorithms will reproduce that association — the same bias amplification pattern we examined in Chapter 14, applied to national security.
Connection to Chapter 14: The algorithmic bias patterns examined in Chapter 14 — biased training data producing biased predictions — apply with equal force to national security algorithms. But the stakes are higher: the consequences of being algorithmically flagged as a national security threat include surveillance, no-fly list placement, border detention, and potentially indefinite incarceration under national security authorities. And the classification of national security algorithms makes independent bias auditing virtually impossible.
"This is the Accountability Gap at its most extreme," Eli argued in his thesis. "When a credit scoring algorithm discriminates, we can at least in principle audit it, challenge it, regulate it. When a national security algorithm discriminates, we can't even know it discriminates — because the algorithm, the training data, and the outcomes are all classified. The people most affected by the discrimination are the least able to challenge it."
36.6 Reform Proposals and Future Directions
36.6.1 Surveillance Reform
Post-Snowden reform efforts have produced some changes but have not resolved the fundamental tensions:
The USA FREEDOM Act (2015) ended bulk telephone metadata collection under Section 215, required FISC opinions involving significant legal interpretations to be declassified, and created the amici curiae mechanism. But it left Section 702 and Executive Order 12333 authorities largely intact.
Section 702 reauthorization debates have become the primary battleground for surveillance reform. The most recent reauthorization (2024) included some transparency and compliance reforms but did not address the backdoor search loophole or impose a warrant requirement for searches of US person communications.
Warrant requirements for US person queries. The most significant pending reform proposal would require intelligence agencies to obtain a warrant before searching Section 702 databases using US person identifiers. This would close the backdoor search loophole without affecting the underlying authority to target foreign persons.
Algorithmic accountability for intelligence systems. Emerging proposals call for bias auditing of intelligence algorithms, conducted by cleared independent auditors with appropriate security clearances. This would extend the algorithmic accountability frameworks examined in Chapter 17 to the national security domain — where they are arguably most needed and most difficult to implement.
36.6.2 The Transparency Imperative
Meaningful democratic oversight of intelligence activities requires some degree of transparency — but the requirements of secrecy in intelligence operations create a genuine tension.
The challenge is to identify forms of transparency that serve democratic accountability without compromising intelligence sources and methods:
- Aggregate transparency: Publish statistics on the scope of surveillance (number of targets, number of US persons' communications collected, number of queries using US person identifiers) without revealing specific targets or operations.
- Legal transparency: Declassify FISC opinions that interpret legal authorities, so that citizens can know how the law is being applied in their name.
- Accountability transparency: Publish the results of IG investigations, compliance reviews, and audit findings — not the underlying intelligence but the assessment of whether the intelligence was collected and used lawfully.
- Sunset provisions: Require periodic reauthorization of surveillance authorities, forcing Congress and the public to explicitly renew programs rather than allowing them to operate indefinitely on autopilot.
Reflection: The national security surveillance debate involves genuine values in tension — security and liberty, secrecy and transparency, collective safety and individual rights. Using the proportionality framework (legitimate aim, necessity, proportionality, safeguards), evaluate a specific surveillance program discussed in this chapter. Where does your analysis lead? What additional information would you need to make a more confident assessment?
36.7 Chapter Summary
Key Concepts
- FISA and its amendments (particularly Section 702) provide the legal foundation for US intelligence surveillance, authorizing both targeted and mass collection of communications.
- Incidental collection and the backdoor search loophole allow intelligence agencies to effectively conduct warrantless surveillance of Americans by searching databases constructed for foreign intelligence purposes.
- The Five Eyes alliance enables intelligence sharing among allied nations, creating structural capacity for circumventing domestic legal protections.
- The encryption debate pits law enforcement's need for lawful access against the technical consensus that backdoors create vulnerabilities exploitable by all adversaries.
- Democratic oversight mechanisms — the FISC, congressional committees, inspectors general — provide some accountability but are structurally limited by secrecy, one-sided proceedings, deference, and classification constraints.
- Proportionality analysis requires that surveillance pursue legitimate aims, be necessary, impose burdens proportionate to benefits, and include adequate safeguards.
- National security surveillance disproportionately affects communities of color, reproducing historical patterns of threat inflation, discriminatory targeting, and accountability evasion through classification.
Key Debates
- Is mass surveillance necessary for national security, or can targeted surveillance achieve the same security benefits with less intrusion on civil liberties?
- Should encryption be weakened through lawful access mandates, or does the security cost of backdoors outweigh the law enforcement benefit?
- Can secret courts provide meaningful judicial oversight, or is the adversarial process essential to genuine accountability?
- Should intelligence algorithms be subject to independent bias auditing, even if such auditing requires cleared auditors operating under classification constraints?
Applied Framework
The Surveillance Proportionality Assessment: 1. Legitimate aim — What security objective does the surveillance serve? Is the objective genuine and specific, or vague and expansive? 2. Necessity — Could the objective be achieved through less intrusive means? What evidence supports the claim that mass collection is necessary? 3. Proportionality — Do the privacy, expression, and association costs of the surveillance exceed its security benefits? Who bears those costs? 4. Safeguards — Are oversight mechanisms independent, adversarial, transparent, and empowered to constrain abuse? 5. Distributional analysis — Does the surveillance fall disproportionately on specific communities? Does it reproduce historical patterns of discriminatory targeting?
What's Next
From the surveillance programs of the world's most powerful governments, we turn to the perspectives of the world's majority. In Chapter 37: Global South Perspectives on Data Governance, we examine how countries across Africa, Asia, and Latin America are developing their own approaches to data governance — sometimes following Western models, sometimes rejecting them, and sometimes leapfrogging them entirely. Sofia Reyes, whose border surveillance experience connects the US national security apparatus to the lived reality of communities at the US-Mexico border, bridges the analysis from this chapter to the global perspective of the next.